0
Your cart

Your cart is empty

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Buy Now

Complete Guide to CISM Certification (Hardcover) Loot Price: R2,984
Discovery Miles 29 840
Complete Guide to CISM Certification (Hardcover): Thomas R. Peltier, Justin Peltier

Complete Guide to CISM Certification (Hardcover)

Thomas R. Peltier, Justin Peltier

 (sign in to rate)
Loot Price R2,984 Discovery Miles 29 840 | Repayment Terms: R280 pm x 12*

Bookmark and Share

Expected to ship within 12 - 17 working days

The Certified Information Security Manager(R)(CISM(R)) certification program was developed by the Information Systems Audit and Controls Association (ISACA(R)). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM(R) Certification examines five functional areas-security governance, risk management, information security program management, information security management, and response management.

Presenting definitions of roles and responsibilities throughout the organization, this practical guide identifies information security risks. It deals with processes and technical solutions that implement the information security governance framework, focuses on the tasks necessary for the information security manager to effectively manage information security within an organization, and provides a description of various techniques the information security manager can use. The book also covers steps and solutions for responding to an incident. At the end of each key area, a quiz is offered on the materials just presented. Also included is a workbook to a thirty-question final exam.

Complete Guide to CISM(R) Certification describes the tasks performed by information security managers and contains the necessary knowledge to manage, design, and oversee an information security program. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators.

General

Imprint: Auerbach Publishers Inc.
Country of origin: United Kingdom
Release date: December 2006
First published: 2007
Authors: Thomas R. Peltier • Justin Peltier
Dimensions: 234 x 156 x 32mm (L x W x T)
Format: Hardcover
Pages: 474
ISBN-13: 978-0-8493-5356-7
Categories: Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
LSN: 0-8493-5356-4
Barcode: 9780849353567

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Rethinking the Regulation of…
Syren Johnstone Hardcover R3,361 Discovery Miles 33 610
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,907 Discovery Miles 29 070
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R895 Discovery Miles 8 950
Cybersecurity and Third-Party Risk
GC Rasner Paperback R773 Discovery Miles 7 730
Database Security
Melissa Zgola, Alfred Basta Paperback R1,240 R1,065 Discovery Miles 10 650
Alice and Bob Learn Application Security
T Janca Paperback R901 Discovery Miles 9 010
Kryptowahrungen fur Dummies
K Soeteman Paperback R422 Discovery Miles 4 220
Networks, Security and Complexity - The…
Sean P. Gorman Hardcover R2,902 Discovery Miles 29 020
Cybersecurity Law, Third Edition
J Kosseff Hardcover R2,669 Discovery Miles 26 690
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,273 R1,098 Discovery Miles 10 980
Cryptography - Theory and Practice
Douglas Robert Stinson, Maura Paterson Paperback R1,437 Discovery Miles 14 370
Hands-On Ethical Hacking and Network…
Rob Wilson Paperback R1,416 R1,212 Discovery Miles 12 120

See more

Partners